hoheinzollern / workshop-cybersikkehed
Workshop on binary exploitation for the Danish Cybersecurity Championships
☆16Updated 8 months ago
Related projects ⓘ
Alternatives and complementary repositories for workshop-cybersikkehed
- ☆8Updated 11 months ago
- ☆14Updated last year
- United States Air Force Academy public tools☆18Updated 2 weeks ago
- knowledge is power☆205Updated 7 months ago
- This repo is aim to compile all Flare-On challenge's binaries. Update: 2014 -2022.☆298Updated 2 years ago
- Place for content used during GenCyber camps.☆13Updated last year
- Great List of Resources to Build an Enterprise Grade Home Lab☆792Updated 11 months ago
- Collection of online security resources☆263Updated last year
- An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.☆675Updated last month
- Stash for Binary Exploitation and Reverse Engineering Resources☆98Updated 4 years ago
- A not so awesome list of malware gems for aspiring malware analysts☆797Updated last year
- A Highly Accessible and Automated Virtualization Platform for Security Education☆187Updated 3 weeks ago
- Collection of resources I have used throughout my studies (cybersecurity and systems)☆212Updated 10 months ago
- A curated list of tools related to Industrial Control System (ICS) security and Penetration Testing☆274Updated 3 years ago
- Open-Source PowerShell module to allow online play of Backdoors & Breaches card game devised by Black Hills Information Security☆55Updated 3 years ago
- ☆104Updated 9 months ago
- Writeups for the ACI Cyberstakes CTF 2018☆23Updated 5 years ago
- A sorted and updated list of security wargame sites.☆913Updated 2 months ago
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆389Updated 2 years ago
- CTF Cheatsheet☆50Updated 5 months ago
- CTFNote is a collaborative tool aiming to help CTF teams to organise their work.☆522Updated this week
- ☆206Updated last year
- CONVEX is a group of CTFs that are independently deployable into participant Azure environments.☆137Updated 2 years ago
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆703Updated 2 weeks ago
- Instructions on how to create your very own Pwnbox, originally created by HTB☆386Updated 2 years ago
- A collection of resources if you want to get into malware research. Pull requests are very welcome.☆95Updated 5 years ago
- This repositories contains sources and writeups for N0PSctf 2024.☆11Updated 2 months ago
- A curated list of awesome Ghidra materials☆1,174Updated 3 years ago
- Writeups of previous editions☆71Updated 9 months ago
- President's Cup Cybersecurity Competition Challenges☆147Updated last month